Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

Cybersecurity-Architecture-and-Engineering Exam Dumps - WGU Cybersecurity Architecture and Engineering (KFO1/D488)

Go to page:
Question # 65

An e-learning company uses Amazon Simple Storage Service (Amazon S3) to store e-books and video files that are served to customers through a custom application. The company has realized that someone has been stealing its intellectual property. Which threat actor is most likely in this scenario?

A.

Competitor

B.

Hacktivist

C.

Advanced Persistent Threat

D.

Novice hacker

Full Access
Question # 66

An organization sends customers e-mail messages based on their purchase patterns.

Which characteristic of quality data does this represent?

A.

Relevant

B.

Timely

C.

Thorough

D.

Accurate

Full Access
Question # 67

What is the correct order of project phases?

A.

1)Initiation2)Executing3)Planning4)Monitoring and Controllings) Closing

B.

1) Planning2) InitiationAMonitoring and Controlling4) Executings) Closing

C.

1) Executing2) Monitoring and Controlling3) Initiation4) Planning5) Closing

D.

1) Initiation2) Planning° 3) Executing4) Monitoring and Controllings) Closing

Full Access
Question # 68

An organization wants to implement a new encryption solution for a real-time video conferencing application. The organization wants to ensure that the encryption solution provides protection for the video stream without causing significant delays or latency in the conference.

Which type of encryption will meet the needs of the organization?

A.

Block ciphers

B.

Asymmetric encryption

C.

Stream ciphers

D.

Hash functions

Full Access
Question # 69

An engineer has noticed increased network traffic originating from an unknown IP address. Which action should be taken to analyze the unusual network traffic patterns?

A.

Compare the unknown address to known IP addresses to determine if it is a threat

B.

Temporarily block all incoming traffic from the unknown IP address

C.

Permanently block all incoming traffic from the unknown IP address

D.

Rate limit incoming traffic from the unknown IP address

Full Access
Go to page: